Logging in remotely exposes security-critical traffic to eavesdropping.
Even if you somehow protect the remote login, the security of the system is
reduced to the security of the remote login session. Use the ssh command
for secure remote login.

Change the default
values of the global transmission parameters on each system.

Example 23–14 Shortening IKE Phase 1 Negotiation Times

In the following example, a system is connected to its IKE peers by
a high-speed line with little traffic. The original settings are in comments
in the file. The new settings shorten the negotiation time.